summaryrefslogtreecommitdiff
path: root/usr.bin
AgeCommit message (Collapse)Author
2019-11-28ks_mapblocks is gonePhilip Guenther
2019-11-28improve the text for -A a little;Jason McIntyre
input from naddy and djm
2019-11-28reshuffle the text to read better;Jason McIntyre
input from naddy, djmc, and dtucker
2019-11-28Add manual for openssl(1) cmsKinichiro Inoguchi
ok and comments jmc@
2019-11-28Missing after-kill-pane option.Nicholas Marriott
2019-11-28Parse out DA features.Nicholas Marriott
2019-11-28Long lines and spacing fixes.Nicholas Marriott
2019-11-28Add xrecallocarray.Nicholas Marriott
2019-11-28Bump the escape sequence timeout to five seconds to allow for longerNicholas Marriott
legitimate sequences.
2019-11-28Make a best effort to set xpixel and ypixel for each pane and addNicholas Marriott
formats for them.
2019-11-28Store xpixel/ypixel from TIOCGWINSZ and add formats.Nicholas Marriott
2019-11-28status-left and status-right need push-default also, reported by EricNicholas Marriott
Pruitt in GitHub issue 1989.
2019-11-28tweak wordingDamien Miller
2019-11-27remove stray semicolon after closing brace of function;Damien Miller
from Michael Forney
2019-11-27REG_STARTEND is not portable, but it turns out we don't actually needNicholas Marriott
it. From Evan Green, GitHub issue 1982.
2019-11-27use _PATH_PROTOCOLS from netdb.h insteadTheo de Raadt
2019-11-27Initialize nfds fields of new file structures.Alexandre Ratchov
Fixes a possible crash when a new file structure is added in the time-out processing code-path.
2019-11-27Revert previous commit. The channels code still uses int in many placesDarren Tucker
for channel ids so the INT_MAX check still makes sense.
2019-11-27use error()+_exit() instead of fatal() to avoid running cleanupDamien Miller
handlers in child process; spotted via weird regress failures in portable
2019-11-27Make channel_id u_int32_t and remove unnecessary check and cast that wereDarren Tucker
left over from the type conversion. Noted by t-hashida@amiya.co.jp in bz#3098, ok markus@ djm@
2019-11-26tweak previous;Jason McIntyre
2019-11-26Prevent divide-by zero in tcpbench(1). Found while testing iwm(4).Stefan Sperling
#0 0x000004c27b9051a9 in udp_process_slice (fd=<optimized out>, event=<optimized out>, v_sc=0x4c55279f500) at /usr/src/usr.bin/tcpbench/tcpbench.c:606 606 pps = (sc->udp_slice_pkts * 1000) / since_last; (gdb) p since_last $1 = 0 ok benno@
2019-11-26Add default # and * binding with vi(1) keys.Nicholas Marriott
2019-11-26kdump reads /etc/protocols to translate proto numbers into names; ok sthen@ ↵Otto Moerbeek
gilles@
2019-11-26more debugging; behind DEBUG_SKDamien Miller
2019-11-25Don't use motion flag uninitialized.Nicholas Marriott
2019-11-25Fix a warning in previous.Nicholas Marriott
2019-11-25Do not clear search marks on cursor movement with vi(1) keys, from EricNicholas Marriott
Pruitt in GitHub issue 1985.
2019-11-25Add p format modifier for padding to width.Nicholas Marriott
2019-11-25Allow multiple substitutions in a single format.Nicholas Marriott
2019-11-25redundant testDamien Miller
2019-11-25document the "no-touch-required" certificate extension;Damien Miller
ok markus, feedback deraadt
2019-11-25Print a key touch reminder when generating a security key. Most keysDamien Miller
require a touch to authorize the operation.
2019-11-25allow "ssh-keygen -x no-touch-required" when generating a security keyDamien Miller
keypair to request one that does not require a touch for each authentication attempt. The default remains to require touch. feedback deraadt; ok markus@
2019-11-25add a "no-touch-required" option for authorized_keys and a similarDamien Miller
extension for certificates. This option disables the default requirement that security key signatures attest that the user touched their key to authorize them. feedback deraadt, ok markus
2019-11-25Add a sshd_config PubkeyAuthOptions directiveDamien Miller
This directive has a single valid option "no-touch-required" that causes sshd to skip checking whether user presence was tested before a security key signature was made (usually by the user touching the key). ok markus@
2019-11-25Add new structure for signature optionsDamien Miller
This is populated during signature verification with additional fields that are present in and covered by the signature. At the moment, it is only used to record security key-specific options, especially the flags field. with and ok markus@
2019-11-25memleak in error pathDamien Miller
2019-11-24Only substitute patterns starting with ^ once.Nicholas Marriott
2019-11-22Wait for FD to be readable or writeable during a nonblocking connect,Darren Tucker
not just readable. Prevents a timeout when the server doesn't immediately send a banner (eg multiplexers like sslh) but is also slightly quicker for other connections since, unlike ssh1, ssh2 doesn't specify that the client should parse the server banner before sending its own. Patch from mnissler@chromium.org, ok djm@
2019-11-20Do not check the client readonly flag when there is no client, GitHub issue ↵Nicholas Marriott
1980.
2019-11-19adjust on-wire signature encoding for ecdsa-sk keys to better matchDamien Miller
ec25519-sk keys. Discussed with markus@ and Sebastian Kinne NB. if you are depending on security keys (already?) then make sure you update both your clients and servers.
2019-11-19a little more information from the monitor when signatureDamien Miller
verification fails.
2019-11-19revert previous: naddy pointed out what's meant to happen. rethink needed...Jason McIntyre
2019-11-19-c and -s do not make sense with -k; reshuffle -k into the main synopsis/usage;Jason McIntyre
ok djm
2019-11-19More return value check in openssl(1) cmsKinichiro Inoguchi
Checking return value of sk_.*_new_null(). ok beck@ jsing@
2019-11-19Add manual descriptions for openssl(1) req -addextKinichiro Inoguchi
ok jmc@
2019-11-18document '$' environment variable expansion for SecurityKeyProvider; ok djm@Christian Weisgerber
2019-11-18more missing mentions of ed25519-sk; ok djm@Christian Weisgerber
2019-11-18additional missing stdarg.h includes when built without WITH_OPENSSL; ok djm@Christian Weisgerber